Technical Document on Overview Wireless, Mobile and Sensor Networks

Size: px
Start display at page:

Download "Technical Document on Overview Wireless, Mobile and Sensor Networks"

Transcription

1 Technical Document on Overview Wireless, Mobile and Sensor Networks GDD GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress and continues to evolve rapidly. Certain aspects of the GENI architecture are not yet addressed at all, and, for those aspects that are addressed here, a number of unresolved issues are identified in the text. Further, due to the active development and editing process, some portions of the document may be logically inconsistent with others.

2 This document is prepared by the Wireless Working Group. Editors: S. Paul, Rutgers J. Evans, U Kansas D. Raychaudhuri, Rutgers Contributing workgroup members: V. Bahl, Microsoft C. Bostian, Virginia Tech C. Elliott, BBN D. Estrin, UCLA E. Belding-Royer, UCSB M. Gerla, UCLA G. Minden, U Kansas J. Heidemann, ISI/USC E. Knightly, Rice M. Welsh, Harvard R. Govindan, USC S. Seshan, CMU W. Trappe, Rutgers

3 1 Executive Summary This is an interim report on wireless, mobile and sensor network aspects of GENI, and is intended to be a work-in-progress snapshot from the GENI Wireless Working Group (WWG) as of July The GENI Wireless Working Group activities were initiated in March 2006 under the framework of the GENI Project Development Plan (PDP). The working group is led by D. Raychaudhuri and J. Evans as co-chairs, and currently has 13 other members with expertise across various wireless networking specializations including areas such as ad hoc networking, mobile and vehicular networks, sensor networks, cognitive radio and security. The GENI wireless working group s scope-of-work and primary deliverables (during the oneyear period from 3/06-3/07) as defined in the GENI PDP document are: Baseline design specifications for GENI wireless subnets Draft reports on wireless subnet implementation plans Final report, including design specs and system engineering details Design studies and laboratory evaluations of candidate experimental wireless technologies and platforms Wireless platform specification document Critical platform and radio technology studies Selected platform evaluation results and recommendations GENI integration plans including control, management and experimental measurement frameworks Report on GENI integration including control/management interface specification for wireless Guidance for GENI development projects and wireless networking research Proposals for proof-of-concept projects on key hardware and software technologies Experimental wireless network research agenda and roadmap Planning for community events and demos in support of the GENI readiness process The WWG s plenary discussions during the period 3/06-6/06 have focused on updating the baseline spec for each of the wireless GENI subnetworks under consideration, i.e. wireless network emulators, urban mesh, suburban wide-area, sensor networks and cognitive radio. The WG has also discussed experimental research in the wireless/mobile/sensor areas in order to better identify infrastructure requirements, and to provide wireless community input to the GENI Research WG. This working document is intended to summarize the results of these discussions and to identify future work and inter WG coordination topics. Sec 2 below provides an overview of the wireless/mobile/sensor network research agenda in the form of scenario descriptions, some Internet architecture considerations, and a top 10 experiment list contributed by various members of the WG. This is followed by Sec 3 which provides updated descriptions of each of the wireless subnetworks planned for GENI, with technical details being filled in as they become available. Note that the high-level system descriptions in Sec. 3 may be expected to evolve

4 during the preparedness process as technical studies on applicable platforms, key technologies, system software and deployment planning become available from the WG. The WWG also focused on a number of critical technical issues that need to be resolved to finalize the GENI wireless development plan. In particular, several sub-working groups were formed to address the following open technical issues: Virtualization in wireless networks Sensor network deployment details Vehicular mobility requirements and experimental scenarios Integration of control and management across wired and wireless networks in GENI Programmable and cognitive radio technology issues and deployment plan Preliminary reports on each of the above sub-working group study topics are given in Sec. 4. Sec 5 provides a work-in-progress view of the system engineering methodology by which a specific wireless subnet in GENI (the urban mesh) is being designed in accordance with WBS guidelines. The draft report concludes in Sec. 6 with a list of future work items and inter-wg coordination items. 2 Wireless research vision and sample GENI experiments - The Wireless Mobile Planning Group (WMPG) report 1 issued in Aug 2005 identified several usage scenarios associated with emerging wireless and sensor network scenarios. Summaries of these scenarios are reproduced from the WMPG report as follows. 2.1 Scenario A: Individual Wireless Devices Interfacing with the Internet ( Mobile Computing ) The simplest scenario involves a single wireless device that interfaces with the broader Internet. The mobile device may be a cellular phone, a PDA, a media player, a digital camera or some type of combination consumer device. Mobile computing devices may connect through a wireless local area network, a mesh-style wireless network, or a wide-area wireless technology 1 New Architectures and Disruptive Technologies for the Future Internet the Wireless, Mobile and Sensor Net Perspective, WMPG workshop report, Aug 2-3,

5 (such as cellular 3G or WiMax). Service models to be considered include mobile services, hotspot services with limited mobility, as well as cached content delivery via opportunistic wireless links. High mobility, the potential for intermittent connectivity, and heterogeneity of radio access are key characteristics of this scenario. A typical example of this mode of operation is that of a mobile customer downloading a realtime video stream (e.g., a live sporting event) to a portable media player from the Internet. Seamless connectivity should be maintained as the customer moves from a shopping mall (WiFi coverage) to outdoors (2.5G or 3G cellular connectivity) and then to the car (Bluetooth within the car, WiMax radio to the Internet). At each step, the wireless media player needs to be aware of available connectivity options and then select the best service. The multimedia server must also be aware of current connectivity constraints so that it can deliver a stream with parameters (data rate, format, etc) consistent with the configuration. The same mobile customer should be efficiently tracked by the network and reachable by VoIP calls, if he/she so chooses. Location- or context-aware queries (such as where is the nearest pharmacy? ) and delay-tolerant services (e.g., seamless suspension and resumption of a large file transfer when the user walks or drives through areas without coverage) should be supported. Caching of files for rapid downloading within a hot-spot may also be useful in this scenario. 2.2 Scenario B: Constellations of Wireless Devices ( Ad-hoc Nets ) The second type of wireless scenario is motivated by a variety of settings in which multiple radio devices may be in close physical proximity and can collaborate by forming an ad-hoc network. For example, wireless devices in an office or home environment can set up an ad-hoc network between themselves to improve coverage and communications quality. Another popular application involving constellations is that of community mesh networks formed by rooftop radios for the purpose of shared broadband access. In the important emerging application of automotive telematics, clusters of cars on the highway may participate in an ad-hoc network for the purpose of collision avoidance and traffic flow management. Constellations may include heterogeneous radio and computing devices with different capabilities and resource levels. Emerging cognitive radio technologies also offer the capability of highly adaptive wireless adhoc networks with physical layer negotiation between nodes, practically scavenging unused spectrum at low cost to support a private ad hoc network. Opportunistic association, changing network topologies, varying link quality and potentially large scale (in terms of number of nodes) are some of the characteristics of this scenario. A simple example of opportunistic constellations is the formation of an ad hoc network between several user laptops in a meeting room with limited Internet access coverage. The ad hoc network enables high bandwidth communication between participants at the meeting and allows - 3 -

6 them to use a favorably positioned (e.g., with good cellular network throughput) node as a forwarding relay to the Internet. Another example is the cooperative downloading of popular files from the Internet by drivers on a highway. Suppose hot-spot infostations with WiFi service are spaced by several miles on the highway and a car traveling at 60 miles/hr can download only fractions of a MB during each contact with an infostation. If several drivers are interested in the same file, it is possible for the cars to exchange segments in a P2P opportunistic networking arrangement similar to that used in Bit Torrent. This way, the download can be completed without requiring a car to stop at a hot spot, saving time for the end-user and avoiding traffic congestion problems. The same ad hoc networking capability can also be used by cars to exchange control information necessary for traffic flow management or collision avoidance. Ad hoc radio constellations also apply to civilian disaster recovery and in tactical defense environments. These applications usually involve communications between a number of first responders or soldiers who work within close proximity of each other. The response team may need to exchange text messages, streaming media (e.g. voice or video), and use collaborative computing to address a shared task such as target recognition or identification of a spectral jammer. Individual nodes may also need to access the Internet for command and control purposes or for information retrieval. This application has similarities with the ad hoc mesh network for suburban or rural broadband access mentioned earlier. 2.3 Scenario C: Pervasive Systems and Sensor Networks ( Sensor Nets ) Sensor nets refer to a broad class of systems involving embedded wireless devices connected to the Internet. The first generation of sensor networks involves collecting and aggregating measured data from large numbers of sensors in a specified geographic area. In the near future, sensor net applications will also include closed-loop sensor/actuator systems for real-time control of physical world objects. Current sensor net applications are in science (ecology, seismology, ocean and atmospheric studies, etc.), and engineering (water quality monitoring, precision agriculture, livestock tracking, structural monitoring), as well as consumer-oriented applications (home security and energy management, hobbyist and sports enthusiast applications of distributed imaging, eldercare, pet monitoring, etc). Sensor networks share several characteristics of ad-hoc scenarios but are differentiated by the fact that tiny sensor devices have more stringent processing power, memory and energy constraints. These constraints generally imply the need for a hierarchical ad-hoc network structure in which low-tier sensor nodes connect to the Internet via one or more levels of repeating wireless gateways. Other important characteristics of this scenario are the data-centric nature of applications, potential for large scale (in terms of numbers of sensors) and geographic locality

7 Traditionally, large sensor fabrics such as those installed to monitor the environment have been designed as vertically optimized systems, with an ad hoc network designed to meet specific energy and processing constraints and optimized to support specialized queries dictated by the application at hand. The interface to the Internet has been via edge nodes that isolate the Internet stack from the sensor fabric architecture. However, more recent trends indicate an increased need for sensor networks that provide open access via the Internet, in a more extensive and capillary way that can be supported via edge nodes. For instance, scientists interested in the correlation between data found in different data bases, (e.g. soil characteristics, pollutants carried in the local water supplies, productivity of local vineyards, production and sale of local wines), may be permitted to access specific regions within a sensor fabric directly from the Internet, to extract the required data rather than overburdening the access gateways. Moreover, new types of sensor networks based on mobile sensor platforms are becoming available for example vehicles in the urban grid or firefighters in a disaster recovery operation equipped with a variety of sensors (video, chemical, radiation, acoustic, etc). These sensor platforms have practically unlimited storage, energy and processing resources. The vehicle grid then becomes a sensor network that can be accessed from the Internet to monitor vehicle traffic congestion and to help investigate accidents, chemical spills and possible terrorist attacks. Likewise, firefighters carry cameras and several other sensors, allowing the commander to be aware of the conditions in the field and to direct the operations to maximize the use of the forces, while preserving the life of his responders. These latter examples also show that the gap between sensor networks and ad hoc networks tends to diminish in mobile sensor systems at least in terms of communications capabilities and Internet access. In the longer term, pervasive systems involving personal mobile devices, smart offices/homes and densely deployed multimodal sensors/actuators will serve as a platform for development of various new applications ranging from tracking and inventory control to personal productivity, public safety and resource management. These scenarios are not all-inclusive, but serve as canonical examples of future wireless networks. They do capture many of the requirements that wireless will place upon the future network architecture. Based on the above scenarios, it is possible to identify some architecture and protocol design areas for the future Internet that will be driven by wireless requirements. 2.4 Impact on Future Internet Architecture The Aug 2005 WMPG workshop also identified several architectural drivers for the future Internet based on the scenarios discussed in Sec 2.3 above. Summaries of key wireless/mobile/sensor related features are reproduced from the report as follows: Naming and Addressing Flexibility Today s Internet addressing scheme is rather rigid; it is well suited to a static, hierarchical topology structure. It provides a very efficient way to label (and find) each device interface in - 5 -

8 this hierarchy. To support mobility, the next generation Internet must provide ways to name and route to a much richer set of network elements than just attachment points. It must support routing in terms of names, which identify the actual desired end point, rather than some particular characteristic, such as a physical address. These names may well resolve to addresses at some layer in the architecture, for routing purposes, what is important is that the architecture supports seamless changes in name-address binding. A clean architectural separation between name and routable address is a critical requirement Mobility support Mobility is the most fundamental characteristic of a wireless network with mobile users, and it is therefore imperative that future networks provide mobility support as an integrated, first-class service. Mobility scenarios anticipated in future networks include simple end-user migration from one subnetwork to another (as in cellular or WLAN hot-spot services), as well as more complex mobility patterns involving movement of radio routers and ad-hoc network clusters. Protocol features are also needed to address a new class of network services that take advantage user or platform mobility these include location-based services, the Infostation model and the data-bus service in which data is cached and delivered when an appropriate receiver is within range. Mechanisms are needed for classical location management and low-latency handoff within or between wireless networks, as might occur as a device changes access points or moves between ad-hoc networks. Mobile nodes, constellations of ad-hoc routers and more general entities must be reachable as they move across different wireless domains. Scalable indirection schemes (more efficient and general than existing mobile IP) need to be designed to allow for this functionality. Infostations and data-bus services involve mobility prediction, pre-fetching and data caching, and it is of interest to evaluate what level of support should be provided by the network layer. Mobility can also induce temporary network disconnections. The network layer should support disconnected, delay-tolerant operations, a capability that is current not provided within IP Location Services Another key feature needed for wireless networks is that of a location service, which would provide information about the location of a packet s source or destination. Beyond location as an addressing mechanism the architecture must enable the use of location information for internal network optimizations at all layers and support the development of location-aware applications. Specific point solutions such as geographic routing, mobicast, localization, or location fusion algorithms have been developed and these ideas may be expected to mature further during the next decade. A general solution for integrating location into the next-generation Internet architecture is an important research direction. Protocols for location service should provide the means for communicating entities to indicate their current position and to discover other devices in a specified geographic area. Design considerations include the granularity and type of - 6 -

9 representation for location information, which can vary from conventional descriptions like postal address or room number to geographic coordinate systems Self-Organization and Discovery Emerging wireless system architectures involve ad-hoc network formation based on opportunistic identification of resources in the environment. As a result, protocols used should support discovery of neighboring radios and the topology of existing networks. Self-organizing ad-hoc networks have been built for homogeneous radio environments, but future networks will require more general capabilities for organizing a mix of wired and wireless components [Ga04]. For example, a local network may consist of several ad-hoc wireless clusters interconnected by a set of wired routers. The protocols developed need to incorporate distributed algorithms and measurements for efficient formation of desirable network topologies in an environment with dynamic mobility. Self organization should work in a distributed environment without requiring continuous connectivity to the global network Security and Privacy Wireless networks can be expected to be the platform of choice for launching a variety of attacks targeting the new Internet. At the most basic level, wireless devices will likely have evolving naming and addressing schemes and it will be necessary to ensure that the names and addresses that are used are verifiable and authenticated. There are also a variety of complex security issues related to ad-hoc networks of peers, including management of authentication and trust in purely distributed environments. In addition, wireless networks are subject to a variety of denial-ofservice or man-in-the-middle attacks and future approaches to Internet security will need to take this into consideration. Further, one parameter uniquely associated with wireless networks is the notion of location. Location information provided by the network should be trustworthy. The wireless component of the network should provide both privacy and forensic capabilities, while allowing for the means to manage the tradeoffs between these two complementary considerations. Since the wireless medium allows for adversaries to easily sniff network traffic, it will be essential to provide mechanisms that prevent traffic analysis by adversaries. Additionally the architecture should provision hooks for future extensions to accommodate legal regulations Decentralized management - 7 -

10 From an edge network dominated by the wired Ethernet, the edge is evolving into disparate wireless ecosystems such as cellular, , Bluetooth, RFID, and sensor networks. Managing such disparate dense networks requires augmenting the existing protocol stack for providing efficient remote manageability, diagnosis, configurability and trust. Wireless devices are not always connected to the Internet core. In a next generation Internet, these devices need to be able to form ad-hoc networks that operate with the same services and expectations as the larger Internet, but with limited connectivity. Ad-hoc constellation management involves not only knowing the status of device membership in each constellation but also the nature of interaction with others Cross-layer protocol support As a mobile client crosses different wireless domains, its route characteristics continuously change. Awareness of these dynamic changes (at client, server or both) can be critically useful when supporting applications that require some quality of service, such as multimedia delivery. Important path characteristics include available capacity, loss rate, delay, hop distance, energy, stability, and security. Exposing this information would allow connection end points to make more intelligent routing, association, and protocol decisions without requiring complex probing or estimation techniques. There an obvious trade-offs between layering and complexity, so that future protocol designs need to find the right balance after evaluation of actual performance gains in realistic environments Sensor Network Integration Efficient integration of sensor networks with the global Internet involves several additional requirements. These include the ability to interface with a lightweight sensor network protocol, possibly through a unified hierarchical protocol framework. In addition, sensor networks require the self-organization discovery and location services. Other capabilities needed for sensor scenarios are in-network programming, content awareness, data aggregation and data integrity mechanisms. An attribute or location based dynamic binding service is also important for development of real-time sensor applications involving opportunistic associations. In general, sensor networks require identification of suitable new socket layer abstractions and programming models that differ significantly from today s TCP/IP paradigm Vehicular Network Integration Vehicular communications are becoming a reality, driven by navigation safety requirements and by the investments of car manufacturers and Public Transport Authorities. Safe navigation support through wireless car to car and car to curb communications has become an important priority for Car Manufacturers as well as Municipal Transportation Authorities and - 8 -

11 Communications Standards Organizations. New standards are emerging for car to car communications (DSRC and more recently IEEE p). The availability of powerful car radios, and of abundant spectrum (when not used for emergencies) will pave the way to a host of new applications for the Vehicle Grid (V-Grid). These emerging applications span many fields, from office-on-wheels to entertainment, mobile Internet games, mobile shopping, crime investigation, civic defense, etc. Some of these applications are conventional mobile internet access applications, say, downloading files, reading while on the move, etc. Others involve the discovery of local services in the neighborhood (ex, restaurants, movie theaters, etc) using the vehicle grid as Peer to Peer network. Others yet imply the close interaction among vehicles such as interactive car games. More generally, integration of vehicular networks with GENI will help investigate the Internet network and transport functions that will support these new applications Cognitive Radio Networks Cognitive or software-defined radios are expected to be an important technology driver for wireless networks of the future. Cognitive radios will enable wireless devices to flexibly create many different kinds of communication links depending on required performance and spectrum/interference constraints. These links will become an integral part of the next generation Internet, especially as many wireless network architectures, such as mesh networks, are being proposed as alternative backbone infrastructures. Architecturally, waveform agility enables the concept of a definable link, as opposed to the conventional notion of simple, fixed links. In other words, a link is no longer just an input to the topology and the algorithms that operate on the topology (e.g. OSPF). It is a variable, a parameter that can be controlled as necessary by the protocols. Topology control, i.e. control of which nodes should be able to communicate as well as how they should communicate, should also be an integral part of the architecture Economic Incentives Incentive policies are required to make opportunistic networking work using third party nodes as store and forwarders. In a world of constellations and dynamically changing connectivity in urban and mall areas, it will be beneficial to exploit neighbors resources for a number of services (data forwarding, data ferrying, information stations, etc). However, by helping the neighbor incurs a cost in terms of energy consumption, increased load, throughput reduction and security risk. There should be some form of incentive ranging from credits to micro payments to facilitate this type of cooperation. Similar incentives may be used to encourage cooperative sharing of radio spectrum. 2.5 Sample GENI Experiments - 9 -

12 The GENI infrastructure needed to enable wireless networking architectural research is illustrated through the following example experiments contributed by members of the wireless working group Participatory urban sensing experiments Participatory urban sensing will leverage mobile devices as a platform for data gathering in cities. This will drive development of network architecture through applications that have civic and cultural significance, such as participatory urban planning, community documentation, or tracking of environmental concerns across wide urban areas. This capability might eventually expand to applications that take advantage of network privacy and integrity to support distributed medical and personal health monitoring (e.g., common, repeated tests such as glucose levels and blood pressure) and finally into first responder and other critical urban applications. This experiment will use the GENI facility to explore new network architecture to encourage data-sharing applications by providing novel privacy controls (e.g., in-network resolution control of data and context), data integrity information (e.g., in-network confirmation of location and time of data gathering nodes), and naming/dissemination services. It will expose new network features through simple APIs that can support top-down implementation of sophisticated urban sensing applications but also encourage bottom-up participatory sensing. The participatory urban sensing experiment will: Explore new features at three layers: low-level network services (close to IP layer), fabric level (above transport protocols), web services. Design a data sharing specification framework that allows end-users to easily specify sharing/privacy rules for their own data. Implement and evaluate an architecture of mediating access points and routers that support selective sharing based on those policies: resolution control of location and time context, provisions for operating on physical context information based on the sensor readings (adding jitter/noise to data on-the-fly to decrease resolution) At the fabric level, implement and evaluate naming and dissemination services that respect sharing policies provided by the mobile users. Additionally, consider fabric-level services that manage coverage estimation and sampling of these autonomous mobile nodes. Focus on imager, acoustic and GPS sensors that will be common in the handheld devices. Explore in-node signal processing to implement selective sharing controls, and even perform basic assays (e.g., ph) that use visual indicators with a calibration chart

13 Design simple web services APIs to promote platform usage in urban planning and participation tools created by collaborators in other disciplines. This experiment will require campus, council district or other small-scale city deployments. Sample applications will need to be created in collaboration with community covered by the network. Each application will have components that run on the mobile nodes and as web applications. In order to experiment at reasonable scale, approximately 100 mobile devices will be needed for development (per deployment); with expansion targets to over 1000 existing mobile phone nodes. Access points and routers will need to be placed into experimental cellular and wireless networks. Blade-style servers will be needed to implement fabric services and basic web service APIs Internet-scale sensor network experiments Sensor networking has demonstrated great potential in many areas of scientific exploration, including environmental, geophysical, medical,and structural monitoring. However, sensor networks have largely beenfocused on dense, small-scale deployments to monitor a specific physical area. GENI offers the opportunity to bridge across multiple discrete sensor networks to provide monitoring of physical phenomena at a global scale. In addition, GENI can provide the infrastructure for querying and fusing data across multiple (possibly overlapping) sensor networks in different scientific and administrative domains. As an experiment to demonstrate these ideas in the context of GENI, we propose building an infrastructure to interface real-time sensor data into large-scale distributed setting, focusing on collecting and processing large volumes of sensor data within the GENI network. This would involve developing an appropriate overlay network infrastructure for querying individual sensor data sources; constructing flows of sensor data through multiple stages of filtering, processing, correlation, and aggregation; and delivering the resulting data to the end user. Pushing computation into the overlay network can distribute server load and reduce network bandwidth requirements, thereby increasing scalability in terms of the number of data sources and simultaneous queries that can be supported. A rich application domain for this approach is geophysical monitoring. Examples include monitoring seismic activity along fault lines and at volcanoes, and GPS-based geodesic measurements of plate movements. The NSF EarthScope initiative is building the sensor infrastructure, and tying this source of data into GENI would enable a 'continental scale sensor network' supporting a wide range of real-time geophysical monitoring applications

14 This experiment would provide the opportunity to bridge between sensor networks and the rest of the GENI infrastructure in the context of a realistic application. Doing raises a number of architectural issues, such as: Discovery and addressing of sensor data sources; Design of overlay networks to support queries over high-volume streaming data, including optimal placement of query operators within the overlay; Reliability and data fidelity in long-running queries subject to intermittent failures of data sources and overlay hosts; Load balancing and migration of computation within the overlay network, as well as from the overlay to the underlying sensor networks; Optimizations across multiple queries within the overlay, e.g., combining computation for similar subqueries. Studying these problems will undoubtedly impact the overall GENI design as it pertains to support for sensor networks as well as large-scale stream data processing. This experiment will require two primary components: (1) seismic and geodesic sensors deployed over a large geographic area; and (2) a number of overlay hosts in the GENI infrastructure for collecting and processing sensor data streams. In terms of sensor requirements, we expect that several (two to five) arrays of nodes each can provide the data sources for this experiment. It may be possible to tap into existing or planned EarthScope sensors for this purpose, or else deploy specially-tasked sensor arrays, e.g., on a fault line or active volcano, to collect interesting data. Each sensor array will require connectivity to GENI through a wired, long-distance wireless, or satellite uplink, depending on the deployment location. Collecting and processing data from these sensors will require on the order of overlay network hosts within GENI, each capable of performing data filtering, signal processing, and aggregation. In addition, services are required for archiving sensor data, supporting queries on archived data, and visualization/presentation of results to end users. Of course, these resources do not need to be (and in some sense should not be) unique to this experiment. Much of the planned GENI infrastructure can be leveraged to develop this system, as well as existing sensor emplacements (notably EarthScope). The scope of this experiment is fairly broad and the evaluation goals encompass the following metrics: Scalability - in terms of the number of users and number of sensors;

15 Latency - the ability of the infrastructure to deliver results to end users in a timely fashion. Robustness - ability of the infrastructure to respond to failures of network hosts and links; Fidelity - the accuracy and precision of results returned from queries spanning many (possibly faulty) data sources. Evaluations should be based on fairly realistic queries defined by end-user needs. Working closely with experts in the relevant application domains is essential to this goal. For example, a scientist studying teleseismic signals may have greater interest in the timing precision of signals rather than the actual number of sensors that respond to a query. Understanding these requirements will undoubtedly shape the goals of the GENI architecture.. Scientific study based on large-scale monitoring of geographically diverse data sources is an emergent area. Only recently, with the advent of high-speed networks, has it been possible to perform such studies in near-real-time. Our current Internet infrastructure provides the means to connect sensor data sources with users and software services for archiving and processing that data. However, no framework exists for deploying, managing, optimizing, and sharing a computational infrastructure across experiments and different scientific domains. As a result, the ability of an individual researcher, or even an entire scientific community, to build the appropriate infrastructure to undertake this kind of scientific work is severely limited. GENI offers the potential to enable entirely new kinds of distributed services, as well as to greatly simplify their deployment. As a result, we expect GENI to foster a revolution in scientific progress similar to that enabled by the current Internet Emergency response communications with adaptive ad-hoc networks This experiment will enable and test deployment of adaptive network layers for cognitive radios in an emergency response environment. The use case is a hurricane relief effort, with four distinct environments: a Command Center with extensive wired connectivity and wireless for rapid growth, an Impacted Area with all connectivity provided by wireless units deployed after the incident, an Evacuee Center with rapidly growing center with changing requirements met by cognitive radio deployments, and a Relief Relay Center with a quickly deployed center with mix of wired and wireless to catalog and direct relief. Each environment has its own messaging requirements that will drive the specific experiment, and the experiment will explore deploying protocols for adaptive communications depending on messaging needs. This experiment will analyze and develop applications suited to emergency communications that take advantage of flexible radio and network protocols to allow for tailored communication

16 environments. Multiple network layer protocol implementations will be developed and mechanisms to allow researchers to select and utilize a particular network layer on a per application basis, over the cognitive wireless radio network, will be created. The experiment will allow networking researchers and emergency responders to evaluate models including multiple preemptible one-to-one communications and group messaging of key information, public announcements, etc. It will improve understanding of how to configure cognitive radio stacks based on communication model (one-to- one, one-to-many, bandwidth, density) as well as physical environment. It will also improve understanding of how to adapt cross-layer (PHY/MAC/network) cognitive radios to changing application needs in a rapidly changing wireless environment. It will lead to software applications that can choose the most appropriate network stack based on the experimental results, given a particular application, layer 1 and layer 2 environment, and constraints/guidelines such as: best overall coverage, lowest power (preserve batteries), etc. It will lead to creation of the tools necessary to allow security and policy constraints to guide cognitive radio deployments that interact with end-to-end applications. An expected outcome from this experiment is the development of protocol stacks that are aware of layer 1, layer 2, network, and application constraints and requirements, and self configure to deliver the application the most appropriate communication network. A societal objective is that it will increase the ability of early responders and longer-term support to reach victims. This experiment will require 3-4 GENI access points and 5-10 wireless subnets of cognitive radios. GENI uniquely provides geographically separate but linked test environments which can be provide a realistic test system. In the experiment scenario, the Impacted Area will have multiple wireless subnets and be the target for point to multipoint announcements, and point to point coordination. The Evacuee Center will utilize cognitive radios to provide coverage and access to a growing population, expected communication flows of broadcasts (finding relatives) and point to point communications (requesting supplies etc), will transition to a more traditional mix as the center works to provide longer term communication needs (telecommuting, etc.). The Relief Relay Center will utilize wired and wireless capabilities with mobile scanning and tracking devices (RFID, etc) to catalogue shipments of supplies, and provide directions to get the supplies to the best locale. The Command Center Setup will utilize wired and wireless systems to receive updates from the impacted area on needs, available routes, local conditions etc, and then coordinate the delivery of supplies via the relief tracking center, and the initiation of rescue missions based on information received from the Impacted Area (broadcasts for help) or specific leads provided by people at the Evacuee Center. For each environment and application the infrastructure must measure at each node parameters such as receiver signal and noise, power utilization, connectivity stability, delay to receive communication, and available application bandwidth. Measurements such as these and surveys of emergency responders can be used to determine effectiveness of particular architectures

17 2.5.4 End-to-end integration of cognitive radio subnetworks with global Internet This experiment is designed to investigate and validate concepts for interfacing cognitive radio subnetworks with the global Internet. Cognitive radios represent a new kind of Internet device (router, end-ser terminal) with a high-degree of adaptation in terms of PHY/MAC and network topology, potentially requiring new protocols and algorithms for efficient addressing and routing. Specific areas of research focus include: Identification of addressing structures that support ad-hoc organization Design of hierarchical aggregation methods for addressing and routing Specification of control interfaces for routing metrics and QoS control Evaluation of end-to-end cross-layer support requirements. The experiment will require 2 or 3 cognitive radio subnetworks (each with ~5-10 mobile end users) connected via different GENI access nodes, a cognitive radio protocol stack running on GENI cognitive radio platform, and software for the aggregated cognitive radio / Internet routers, and protocol modifications at corresponding hosts, and spectrum measurement capabilities deployed within the cognitive radio subnetworks. Experimental measurements that will be needed include cognitive radio subnet parameters (throughput, spectrum efficiency, intranet routing overhead, etc.), network layer parameters such as efficiency of routing and addressing schemes, cross-layer control and processing overheads vs. performance gains, end-to-end performance at the network, transport, and application layer, and long-term service stability versus degree of adaptation Securing the interface between wireless networks and the future global Internet The objective of this experiment is to understand how to secure the interface between wireless networks and the future global Internet. Wireless networks represent a significant point of entry for launching security attacks against the global Internet. This experiment will help analyze and classify threats,specifically:

18 Identify what types of security attacks can be launched from wireless devices on each other Identify what types of security attacks can be launched from wireless devices on other edge infrastructure Identify what types of security attacks can be launched from wireless devices on the core network Differentiate between wireless threats and conventional threats Develop suitable metrics to quantify the relative severity of different attack modalities on network functionality as well as on various types of applications running on users across the network Develop a suite of security solutions to address different classes of threats. For client-toclient threats, solutions must operate locally and might have to consider efficiency or resource issues (e.g. sensor networks). For client-to-edge infrastructure threats, asymmetric assignment of security responsibilities may be delegated to clients and infrastructure. For client-to-core threats, solutions can operate within the core itself. Develop a suite of security solutions for different wireless threats Identify a prioritization of security threats based on severity level and the practicality of their resolution This experiment will require wireless experimental networks: a city-wide mesh/ad hoc network, and a sensor network. Both networks will interface with the broader GENI facility to facilitate wireless-to-wired security evaluation. Application services will run from wireless-to-wired-towireless (e.g. client accessing content delivery service located on the core network), and wireless-to-wired (e.g. sensor network supplying information for a monitoring application). Adversarial nodes will have to be developed that can monitor wireless traffic and inject arbitrary format-compliant data into the medium. Denial-of-service attack modules will need to be developed, as will spoofing and device masquerading tools. Tools for monitoring internal buffer states at wireless nodes and wired nodes on the network will needed to quantify the severity of denial-of-service attacks and the efficiency of packet filtering mechanisms. Cryptographic libraries will need to be implemented (starting from current publicly available libraries) in order to test various solutions. Measurements will also need to be conducted to evaluate threat severity Evaluating global location services for the future Internet The objective of this experiment is to evaluate the efficiency, accuracy and overhead associated with alternative methods for offering global location services in the future Internet. Options that might be evaluated include overlay architectures as well as more integrated layer 3 type solutions associated with the routing protocol

19 The infrastructure needed for this experiment includes existing wireless technology, and the deployment community should be a relatively sophisticated in order to have existing demand and usage patterns. The platforms need to be management-capable devices as well as emerging technologies that allow us to "time travel" and evaluate ideas for the future. Detailed instrumentation is needed, as many experiments need to understand the behavior of the system at a low level (physical signals) Transformational health-care applications in urban mesh networks The objective of this experiment is to enable and test deployment of pervasive high performance wireless and understand operational issues. It would study and develop applications with potential for high societal impact that are enabled by pervasive high performance wireless, study the impact of pervasive high performance wireless on healthcare and quality-of-life issues, and evaluate societal benefits such as reduced emergency room visits in low income neighborhoods, increased access to health-care educational resources and quantifiable cost and health benefits to community. The infrastructure needed for this experiment is coverage over a reasonable area, perhaps greater than 2 sq. km. with broadband wireless access, and deployed protocols with predictable, reliable, resilient performance. The team for this experiment needs to include networking researchers, medical practitioners, and pervasive computing experts. Participants need to be equipped appropriately; for example, nurse practitioners with PDAs and video uplinks. Evaluation would employ surveys, usage studies, and measurements (over a multi-year period) At-scale studies of emerging and disruptive wireless technologies The objective of this experiment is to study emerging wireless standards in deployed and operational network as well as co-existence and interoperability with popular technologies. The experiment is based on deploying the community's advances in wireless data rates (approaching 1 Gb/s) years before commodity hardware arrives, potentially speeding up standards and architectural advances. This will allow fundamental performance studies of disruptive technologies, for example providing network traces at multiple temporal granularities

20 This experiment will need programmable wireless kits in deployed networks in conjunction with existing hardware (say in mesh networks). The infrastructure must support transparent switching between the experimental and existing network in order to operate the emerging networks with real traffic users with safeguards against failure during testing Cognitive radio system evaluation The objective of this experiment is to understand how to minimize use of constrained radio resources while maintaining effective and robust communication. It will attempt to understand how to predict the behavior of many individual radios operating in collaborative and noncollaborative environments, and how to design individual radios so that when placed into a collaborative radio network a desired behavior emerges (e.g. robust communications, or power efficient communications). This experiment will also seek to understand and explain the different experimental methodologies we use: analysis, simulation, emulation, and field trials. Each has advantages and disadvantages and we should understand the appropriate application of each methodology and how the methodologies are inter-related. For example, field trials are good for collecting observations of physical phenomena that are useful in emulation and simulation, but are difficult to exactly repeat and are complex and expensive to set up and run. This experiment will require a cognitive radio subnetwork, and facilities to measure relevant parameters. For example, measurement capabilities need to be able to understand whether Algorithm A or Algorithm B adapts faster, uses fewer radio resources, uses less power, etc., whether radio network architecture A or B (e.g. cellular versus mesh) use fewer radio resources, or whether approach A or approach B provides more accurate/robust location information. Infrastructure capabilities will also be needed to allow for collection of network traces for offline analysis. 3. System-level outlines of GENI wireless subnets The proposed GENI infrastructure will be designed to incorporate a wide range of wireless networking capabilities in order to provide experimenters with access to emerging radio technologies which are becoming increasingly important at the Internet edge. The design objective for GENI wireless networks mirrors that of the wired core network, i.e. the ability to

Technical Document on Vehicular Networks

Technical Document on Vehicular Networks Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications 1 Opportunistic Ad Hoc Networking: the Case for Car to Car Communications Mobiquitous 2005 Mario Gerla Computer Science Dept UCLA What is an opportunistic ad hoc net? A wireless ad hoc extension of the

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.

More information

How To Create A Converged Network For Public Safety

How To Create A Converged Network For Public Safety IP/MPLS Whitepaper Benefits of Converged Networking in a Public Safety Environment Table of Contents Introduction... 2 Current Public Safety Network Landscape... 2 The Migration to All-IP... 3 MPLS Functionality

More information

The Future of Network Marketing Research

The Future of Network Marketing Research ONELAB and experimentally driven research. Leandros Tassiulas http://www.inf.uth.gr/~leandros University of Thessaly Volos, Greece Outline Onelab: facilitating experimentally driven research in Europe

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015

App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015 ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Boosting Business Agility through Software-defined Networking

Boosting Business Agility through Software-defined Networking Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

Telecom Applications:

Telecom Applications: Wireless Broadband: As the global economy continues to expand, so does the demand for information. This information needs to be abundant, diversified, instant, scattered and mobile, all at the same time.

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

The changing face of global data network traffic

The changing face of global data network traffic The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

YOUR INFRASTRUCTURE WILL SUPPORT YOUR SCHOOL S NEEDS 3 TO 5 YEARS FROM NOW.

YOUR INFRASTRUCTURE WILL SUPPORT YOUR SCHOOL S NEEDS 3 TO 5 YEARS FROM NOW. YOUR INFRASTRUCTURE WILL SUPPORT YOUR SCHOOL S NEEDS 3 TO 5 YEARS FROM NOW. TRUE OR FALSE? FIVE QUESTIONS K-12 SCHOOL DISTRICTS SHOULD ASK THEMSELVES AS THEY PREPARE STUDENTS, TEACHERS AND TECHNOLOGIES

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations

More information

Cisco Mobile Network Solutions for Commercial Transit Agencies

Cisco Mobile Network Solutions for Commercial Transit Agencies Cisco Mobile Network Solutions for Commercial Transit Agencies Overview Commercial transit agencies provide a vital service to our communities. Their goal is to provide safe, affordable, and convenient

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

CARMESH. Deliverable 1.1 Summary. Title: Modeling User Demand & Telematics Services

CARMESH. Deliverable 1.1 Summary. Title: Modeling User Demand & Telematics Services CARMESH IAPP-2008-230684 CARMESH Deliverable 1.1 Summary Title: Modeling User Demand & Telematics Services 1. Introduction In order to build the Carmesh system it is important to start with extensive system

More information

white paper Motorola s Wireless network Indoor/Outdoor Solution

white paper Motorola s Wireless network Indoor/Outdoor Solution Motorola s Wireless network Indoor/Outdoor Solution Executive Summary: IDC Research estimates that the mobile worker population will reach one billion worldwide by 2011, accounting for 30.4 percent of

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Defining the Smart Grid WAN

Defining the Smart Grid WAN Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Enterprise Energy Management with JouleX and Cisco EnergyWise

Enterprise Energy Management with JouleX and Cisco EnergyWise Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

References and Requirements for CPE Architectures for Data Access

References and Requirements for CPE Architectures for Data Access Technical Report TR-018 References and Requirements for CPE Architectures for Data Access March 1999 '1999 Asymmetric Digital Subscriber Line Forum. All Rights Reserved. ADSL Forum technical reports may

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

CSci 8980 Mobile Cloud Computing. MCC Overview

CSci 8980 Mobile Cloud Computing. MCC Overview CSci 8980 Mobile Cloud Computing MCC Overview Papers Students can do: 1 long paper or 2 short papers Extra credit: add another By 8am tomorrow, I will randomly assign papers unless I hear from you Protocol:

More information

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

Northrop Grumman White Paper

Northrop Grumman White Paper Northrop Grumman White Paper A Distributed Core Network for the FirstNet Nationwide Network State Connectivity to the Core Network April 2014 Provided by: Northrop Grumman Corporation Information Systems

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet

Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet Version 1.1 June 2010 Authors: Mark Nowell, Cisco Vijay Vusirikala, Infinera Robert Hays, Intel 1. This work represents

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

Vehicular Cloud. Fan Zhang

Vehicular Cloud. Fan Zhang Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information

More information

Why Migrate to the Cisco Unified Wireless Network?

Why Migrate to the Cisco Unified Wireless Network? Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information

Views on Wireless Network Convergence

Views on Wireless Network Convergence Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Application Performance Management

Application Performance Management Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Best Practices for Deploying Wireless LANs

Best Practices for Deploying Wireless LANs Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the

More information

GEOGRAPHIC INFORMATION SYSTEMS (GIS): THE BEDROCK OF NG9-1-1

GEOGRAPHIC INFORMATION SYSTEMS (GIS): THE BEDROCK OF NG9-1-1 GEOGRAPHIC INFORMATION SYSTEMS (GIS): THE BEDROCK OF NG9-1-1 THE TIME IS NOW FOR PSAPS AND REGIONAL AGENCIES TO TAKE ADVANTAGE OF THE ACCURATE GEOSPATIAL DATABASES THAT WILL BE KEY TO NEXT GENERATION EMERGENCY

More information

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks

Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information